Hazard analysis techniques, methods and approaches: A review
Hazard analysis (HA) is an indispensable task during the specification and development of safety-critical systems. It involves identifying potential forms of harm, their effects, causal factors, and the level of risk associated with them. Systems are always vulnerable to mishaps, hazards, or risks t...
| Main Authors: | Kiriyadhatshini, Gunaratnam, Azma, Abdullah, Rohani, Abu Bakar, Hujainah, Fadhl Mohammed Omar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Scholars Network
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/35312/ http://umpir.ump.edu.my/id/eprint/35312/1/Hazard%20Analysis%20Techniques%20Methods%20Paper.pdf |
Similar Items
Review: The limitations of hazard analysis techniques in safety critical system development
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023)
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023)
Safety property attributes in critical systems for requirement specification : A review
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020)
by: Zuraidah, Mat Harun, et al.
Published: (2020)
Investigation of requirements interdependencies in existing techniques of requirements prioritization
by: Hujainah, Fadhl, et al.
Published: (2019)
by: Hujainah, Fadhl, et al.
Published: (2019)
SRPTackle: a semi-automated requirements prioritisation technique for scalable requirements of software system projects
by: Fadhl, Hujainah, et al.
Published: (2021)
by: Fadhl, Hujainah, et al.
Published: (2021)
StakeQP: a semi-automated stakeholder quantification and prioritisation technique for requirement selection in software system projects
by: Hujainah, Fadhl, et al.
Published: (2019)
by: Hujainah, Fadhl, et al.
Published: (2019)
Hazard Analysis for Safety-critical Systems Using SOFL
by: Azma, Abdullah, et al.
Published: (2013)
by: Azma, Abdullah, et al.
Published: (2013)
Stakeholder quantification and prioritisation research: A systematic literature review
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Feature-Based Object Detection and Tracking: A Systematic Literature Review
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
A review: software safety requirement analysis model in critical software development
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
Applying Architectural Analysis for Current Software Systems: A Case Study of KFC and Pizza Hut Online Food Ordering Systems in Malaysia
by: Hujainah, Fadhl, et al.
Published: (2017)
by: Hujainah, Fadhl, et al.
Published: (2017)
A Unified Strategy for Sequence and Sequence-less T-way Test Suite Generation
by: Abdullah, Nasser, et al.
Published: (2016)
by: Abdullah, Nasser, et al.
Published: (2016)
Sequence and sequence-less T-way test suite generation strategy based on flower pollination algorithm
by: Abdullah, Nasser, et al.
Published: (2015)
by: Abdullah, Nasser, et al.
Published: (2015)
A semi-automated requirements prioritisation technique for scalable requirements with stakeholder quantification and prioritisation
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
by: Hujainah, Fadhl Mohammed Omar
Published: (2019)
Collaborative Filtering Similarity Measures: Revisiting
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
Software Requirements Prioritisation: A Systematic Literature Review on Significance, Stakeholders, Techniques and Challenges
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
DNA Computing Technique to Solve Vertex Coloring Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Review on cost-value approach for requirements prioritization techniques
by: Tan, Amelia, et al.
Published: (2018)
by: Tan, Amelia, et al.
Published: (2018)
Analyzing requirement prioritization techniques based on the used aspects
by: Hujainah, Fadhl, et al.
Published: (2016)
by: Hujainah, Fadhl, et al.
Published: (2016)
Review of the Sigmoid Function Implementation into Digital Hardware
by: Syahrulanuar, Ngah, et al.
Published: (2015)
by: Syahrulanuar, Ngah, et al.
Published: (2015)
Investigation of stakeholder analysis in requirement prioritization techniques
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Empirical robustness evaluation of DNA-based clustering methods
by: Rohani, Abu Bakar, et al.
Published: (2011)
by: Rohani, Abu Bakar, et al.
Published: (2011)
Capturing Requirement Specification for Safety-critical System using SOFL and UML
by: Azma, Abdullah, et al.
Published: (2015)
by: Azma, Abdullah, et al.
Published: (2015)
Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation
by: Nasser, Abdullah B., et al.
Published: (2020)
by: Nasser, Abdullah B., et al.
Published: (2020)
An adaptive opposition-based learning selection: The case for jaya algorithm
by: Nasser, Abdullah B., et al.
Published: (2021)
by: Nasser, Abdullah B., et al.
Published: (2021)
SIM-PFED: A simulation-based decision making model of patient flow for improving patient throughput time in Emergency Department
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2021)
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2021)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A Literature Review on Gold Price Predictive Techniques
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation
by: Abdullah, Embong, et al.
Published: (2012)
by: Abdullah, Embong, et al.
Published: (2012)
DNA Computing for Solving Distribution Center Location Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Sigmoid function implementation using the unequal segmentation of differential lookup table and second order nonlinear function
by: Syahrulanuar, Ngah, et al.
Published: (2017)
by: Syahrulanuar, Ngah, et al.
Published: (2017)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Similar Items
-
Review: The limitations of hazard analysis techniques in safety critical system development
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023) -
Safety property attributes in critical systems for requirement specification : A review
by: Azma, Abdullah, et al.
Published: (2023) -
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023) -
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020) -
Investigation of requirements interdependencies in existing techniques of requirements prioritization
by: Hujainah, Fadhl, et al.
Published: (2019)